General
-
Target
a464c66919f4577ddbb6e4528095761af5ca04e28c0b53377e8cb8feaebf85db
-
Size
602KB
-
Sample
241015-nqjqjssama
-
MD5
dc637b68e36b6040ca1f93b13925eaf0
-
SHA1
31c0e78d685fcb2caff797ac0b5fd5905f0953f2
-
SHA256
a464c66919f4577ddbb6e4528095761af5ca04e28c0b53377e8cb8feaebf85db
-
SHA512
57ea0d49a8e414416ca684c672333556a9f44d3a6c4fcf517848d4a91d899bc09f5aeaf1cf7e7fe0d412105da6c5d4bb62a7d0cb2f5e01f518f635977afb0089
-
SSDEEP
12288:3YyNKuBu9k17CV02G/XS9H4CiGoX1X58rM8uM1cKULAV5GkOIiJov:AuBuq171ud4CVoX1XuMi1PGgp5kov
Static task
static1
Behavioral task
behavioral1
Sample
FHr0e3sxVyEquoS.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
%qroUozO;(C2Rlyb - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
%qroUozO;(C2Rlyb
Targets
-
-
Target
FHr0e3sxVyEquoS.exe
-
Size
613KB
-
MD5
9c663f1e3d86b80c289b305dd68b3f1d
-
SHA1
530dcd2e8468f43de91458de8a588613054e7e5a
-
SHA256
20648ff1d02266ebeece4bd2cc799c0b2be339887a45593c43cc851116820d4d
-
SHA512
30ea0932295b8fe069545ad0bfc377501681fad3ac3d8928b66ea657110a0be7e99f269711d3655445ef58c7e7c3c3c2cfe591e938f56656c4eb9c1a5e9067b0
-
SSDEEP
12288:E5US+Vb3QzPD17CV0AE/XS9HmP0JLfnoXBX58rMsuM9MeVvnjvpvo2NGVn2qr:EBYgzPD171gdmP0DoXBXuMSSed1voifq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1